TEHTRIS Deceptive Response provides an effective real-time alarm system, upstream of intrusions, providing a complementary view for the security of your systems and infrastructures. By adding false resources to your network, these sensors lure attackers and provide you with reports and event dashboards.
Unlike products that have to shuffle billions of data, with the risk of generating false alarms, the TEHTRIS Deceptive Response service will only be requested when there is an interaction with it, and usually no one is supposed to play or attack these fake machines that are not officially existing on the network for production purposes.
When a hacker targets a network fortified with TEHTRIS Deceptive Response, he will take the risk of falling on the wrong machines, the famous decoys, triggering an alarm. The hacker has no right to make a mistake, which will complicate his internal exploration sessions, and his lateral movements.